A Use Case for Adding Threat Hunting to Your Security Operations Team. Detecting Adversaries Abusing Legitimate Tools in A Customer Environment. [Guest Diary], (Sun, Apr 7th)
[This is a Guest Diary by Nathaniel Jakusz, an ISC intern as part of the SANS.edu BACS program]
Article Link: https://isc.sans.edu/diary/rss/30816
1 post - 1 participant
Malware Analysis, News and Indicators - Latest topics